Nothing Special   »   [go: up one dir, main page]

Skip to main content

Integrating Grid with Cryptographic Computing

  • Conference paper
Information Security Practice and Experience (ISPEC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3903))

  • 502 Accesses

Abstract

Cryptographic and information security applications often involve many time-consuming computations, which need to be completed over heterogenous and geographically distributed computers. However, there lacks a general-purpose cryptographic computing environment. Grid technology can play a significant role in providing an efficient computational support for cryptographic applications. In this paper, we describe a general-purpose software architecture called Crypto-Grid for distributed high-performance cryptographic computing, which is designed on the top level of computational grid mechanisms, supported by grid environments such as Globus. The prototype implementation of Crypto-Grid under GT4 and experiment evaluation are also revealed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Lenstra, A., Manasse, M.: Factoring by Electronic Mail. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 355–371. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  2. Selkirk, A.P.L., Escott, A.E.: Distributed Computing Attacks on Cryptographic Systems. BT Technology Journal 17(2), 69–73 (1999)

    Article  Google Scholar 

  3. Asbrink, O., Brynielsson, J.: Factoring Large Integers Using Parallel Quadratic Sieve. Technical Report, Royal Institute of technology, Sweden (2000)

    Google Scholar 

  4. Atkins, D., Graft, M., Lenstra, A.K., Leyland, P.C.: The Magic Words are Squeamish Ossifrage. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 263–277. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  5. Gropp, W., Lusk, E., Skjellum, A.: Using MPI: Portable Parallel Programming with the Message-Passing Interface. In: Scientific and engineering computation. MIT Press, Cambridge (1994)

    Google Scholar 

  6. Foster, I., Kesselman, C.: The grid 2: Blueprint for a New Computing Infrastructure. Elsevier Inc., USA (2004)

    Google Scholar 

  7. Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organization. International J. Supercomputer Applications 15(3) (2001)

    Google Scholar 

  8. Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. International J. Supercomputer Application 11(2), 115–128 (1997)

    Article  Google Scholar 

  9. Tuecke, S., Czajkowski, K., Foster, I., et al.: Open Grid Services Infrastructure (OGSI) Version 1.0, Global Grid Forum Draft Recommendation (2003)

    Google Scholar 

  10. Foster, I., Kesselman, C., Nick, J., Tuecke, S.: Grid Services for Distributed System Integration. IEEE Computer Society 35(6), 37–46 (2002)

    Google Scholar 

  11. Foster, I., Frey, J., Graham, S., et al.: Modeling Stateful Resources with Web Services Version 1.1. Global Grid Forum Draft Recommendation (2004)

    Google Scholar 

  12. Dai, W.: Crypto++ – A Free C++ Library for Cryptography, Version 5.2.1 (2005), Available at http://www.cryptopp.com

  13. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)

    Google Scholar 

  14. van Oorschot, P.C., Wiener, M.J.: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12, 1–28 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  15. Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, Z., Lin, D., Xu, L., Lin, L. (2006). Integrating Grid with Cryptographic Computing. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2006. Lecture Notes in Computer Science, vol 3903. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11689522_30

Download citation

  • DOI: https://doi.org/10.1007/11689522_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33052-3

  • Online ISBN: 978-3-540-33058-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics